Skip to main content

Advertisement

Log in

Implementation and performance evaluation of IEEE 802.15.4 unslotted CSMA/CA protocol on Contiki OS

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

In the wireless sensor networks domain, one of the most used standards is IEEE 802.15.4. This standard has been made available on many low power operating systems such as TinyOS and Contiki OS. It is crucial for the implementation to be compliant with the specifications of the standard. In the case of Contiki OS, the provided version of the main medium access algorithm, unslotted Carrier Sensing Multiple Access with Collision Avoidance (CSMA/CA), presents many flaws. In this paper, we discuss the implementation of the provided CSMA/CA algorithm and we point out to the parts that do not respect the standard specifications. We also propose and implement a compliant version of this algorithm and show through simulation the correctness of the implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. LAN/MAN Standard Committee (2006) Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer(PHY) specifications for low-rate wireless personal area networks. IEEE 802.15.4. Std

  2. Aliance Z (2008) Zigbee specifications. Zigbee Standard Organisation, San Ramon

    Google Scholar 

  3. Dunkels A, Grönvall B, Voigt T (2004) Contiki-a lightweight and flexible operating system for tiny networked sensors. In: 29th annual IEEE international conference on local computer networks, pp 455–462

  4. Farooq MO, Kunz T (2015) Contiki-based. IEEE 802.15. 4 Channel capacity estimation and suitability of its CSMA-CA MAC layer protocol for real-time multimedia applications. Mobile Information Systems

  5. Hamadoun T, Gerard C, Michel M (2015) Implementation of IEEE 802.15.4 unslotted CSMA/CA protocol on Contiki OS. Int J Eng Res Technol 4(04):71–75

    Article  Google Scholar 

  6. Pellegrino L, Vieira T, Teixeira A, André P, Monteiro P (2007) Simulation of integrated optic devices based on BPM. Ann Telecommun 62(5–6):653–662

    Google Scholar 

  7. de Deus MA, Carvalho PH, Leite JP (2015) Internet capacity: optimizing autonomous system inbound traffic using specialist knowledge as support for decision-making. Ann Telecommun 70(7–8):331–343

    Article  Google Scholar 

  8. Debbat F, Bendimerad FT (2006) Simulated annealing method coupled with tabu search method for adaptive array antennas optimization problems. Ann Telecommun 61(11–12):1403–1421

    Article  Google Scholar 

  9. Kumar A, Namboothiri PG, Deshpande S, Vidhyadharan S, Sivalingam KM, Murty SAVS (2012) Testbed based throughput analysis in a Wireless Sensor Network. In: Communications national conference, pp 1–5

  10. Edwards J, Demers F, St-Hilaire M, Kunz T (2011) Comparison of ns2. 34’s ZigBee/802.15. 4 implementation to Memsic’s IRIS Motes. In: 7th international wireless communications and mobile computing conference, pp 986–991

  11. Dunkels A (2007) Rime—a lightweight layered communication stack for sensor networks. In: Proceedings of the European conference on wireless sensor networks (EWSN), Poster/Demo session, Delft

  12. Osterlind F, Dunkels A, Eriksson J, Finne N, Voigt T (2006) Cross-level sensor network simulation with cooja. In: 31st IEEE conference on local computer networks, proceedings, pp 641–648

  13. Golomb SW (1971) Mathematical models: uses and limitations. IEEE Trans Reliab 20(3):130–131

    Article  MathSciNet  Google Scholar 

  14. Jurcik P, Koubâa A, Alves M, Tovar E, Hanzalek Z (2007) A simulation model for the IEEE 802.15. 4 protocol: delay/throughput evaluation of the GTS mechanism. In: 15th international symposium on modeling, analysis, and simulation of computer and telecommunication systems. MASCOTS’07, pp 109–116

  15. Fan S, Li J, Sun H, Wang R (2010) Throughput analysis of GTS allocation in beacon enabled IEEE 802.15. 4. In: 3rd IEEE international conference on computer science and information technology, vol 4, pp 561–565

  16. Lee TJ, Lee HR, Chung MY (2006) MAC throughput limit analysis of slotted CSMA/CA in IEEE 802.15. 4 WPAN. IEEE Commun Lett 10(7):561–563

    Article  Google Scholar 

  17. Wen H, Lin C, Chen ZJ, Yin H, He T, Dutkiewicz E (2009) An improved Markov model for IEEE 802.15. 4 slotted CSMA/CA mechanism. J Comput Sci Technol 24(3):495–504

    Article  Google Scholar 

  18. Zheng J, Lee JM (2006) A comprehensive performance study of IEEE 802.15.4. Sensor Network Operations. IEEE Press, pp 218–237

  19. Kim KS, Kazovsky LG (2003) Design and performance evaluation of scheduling algorithms for unslotted CSMA/CA with backoff MAC protocol in multiple-access WDM ring networks. Inf Sci 149(1):135–149

    Article  Google Scholar 

  20. Lee N, Levis P (2003) Tossim: a simulator for tinyos networks. UC Berkeley, Tech. Rep. 1.0

  21. Levis P, Madden S, Polastre J, Szewczyk R, Whitehouse K, Woo A, Culler D (2005) TinyOS: an operating system for sensor networks. In: Ambient intelligence, pp 115–148

  22. Hauer JH (2009) TKN15. 4: an IEEE 802.15. 4 MAC implementation for TinyOS

  23. Flora J, Bonnet P (2006) Never mind the standard here is the TinyOS 802.15. 4 stack. Department of Computer Science, University of Copenhagen, Tech. Rep.

  24. Despaux F, Song YQ, Lahmadi A (2013) On the gap between mathematical modelling and measurement analysis for performance evaluation of the 802.15.4 mac protocol. In: RTN-12th international workshop on real-time networks

  25. Misic J, Misic V (2008) Wireless personal area networks: performance, interconnection, and security with IEEE 802.15. 4. Wiley

Download references

Acknowledgments

This research was conducted with the support of the European Regional Development Fund (FEDER) program of 2014–2020, the region council of Auvergne, and the Digital Trust Chair of the University of Auvergne.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamadoun Tall.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tall, H., Chalhoub, G. & Misson, M. Implementation and performance evaluation of IEEE 802.15.4 unslotted CSMA/CA protocol on Contiki OS. Ann. Telecommun. 71, 517–526 (2016). https://doi.org/10.1007/s12243-016-0522-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-016-0522-y

Keywords

Navigation